management

UPDATED with additional data. The federal government’s ongoing budget woes will result in flat-lined technology budgets over the next five years, forcing agencies to move aggressively away from outdated technologies to make the most of limited budgets, a new report by the TechAmerica Foundation predicted.

Compounding the challenge for agencies is Congressional gridlock over the budget and the looming possibility of sequestration which is hitting the government in the middle of an ambitious technology transformation program, said TechAmerica analyst Robert Haas.

The combination of uncertainty and lack of funds is causing agencies to reassess how they manage older systems and acquire new technologies, he said.

All of that is set against a backdrop of broader uncertainty of how Congress will address the so-called fiscal cliff, involving the expiration of tax breaks and forced budget cuts due to trigger in the new year. Unless Congress takes other steps, the Budget Control Act would force automatic cuts of an estimated $1.2 trillion in federal spending spread evenly over a nine year period beginning in 2013.

Many agencies, as a consequence, are pursuing a strategy of shifting existing funds into new systems and away from older systems. This leads to what Haas referred to as “creative destruction” or the withering of older systems in favor of the new.

Spending in the federal IT market will remain relatively flat through 2018, Haas said. The 2013 budget allocates $73.5 billion for IT projects, with a slight rise to $77.2 billion projected for 2018. But inflation will erode the real value of that spending he said, reducing the effective value of the 2018 funding in constant dollars to about $70.2 billion.

Civilian government IT spending for 2013 will be $40.8 billion and raise slightly to $43.5 billion in 2018. Because of the flat budgets, federal agencies are becoming more aggressive in shifting resources away from legacy systems to newer equipment and software, Haas said.

After a series of funding cuts in recent years, the Defense Department IT budget will remain stable for the next five years, Haas said. The 2013 Defense IT budget is $32.7 billion and is predicted to remain steady at $33.7 billion in 2018.

Sequestration, however, would have an overwhelming impact on defense operations, requiring $52.3 billion in DoD reductions in fiscal year 2013, affecting readiness, training, civilian personnel, military families, services and support, all of which would seriously affect DoD technology investments.

Over the next five years, the DOD will focus on integrating its IT infrastructure by merging telecommunications, satellite communications, networks, wireless systems and computers into a single architecture. Part of this activity includes ongoing efforts to consolidate data centers and move to a cloud computing environment, Haas said.

The Federal IT forecasts are part of new report being released at a conference Oct. 17 that provides detailed predictions of future information technology spending for all major civilian and defense agencies as well as the General Services Administration. It also provides an outlook of IDIQ contract vehicles and other acquisition trends.

The report outlines five possible scenarios of how Congress might tackle the looming Budget Control Act cuts, summarized in the following slides:

Charts courtesy of TechAmerica Foundation.


Despite encryption, a study released today identifies standard email as the number one way unauthorized data leaves a federal agency.

According to the study, 80% of Federal information security managers fear data loss through encrypted email, and 58% state that encryption makes it harder to detect data leaving. Keep reading →

“The liberation of government datasets is important in itself, but data are truly powerful when used in the development of informative apps.” So proclaimed Todd Park, Brian Forde and Jo Strang in a recent White House Blog, Safety Data Jam connects Tech Innovators with Public Safety Officers.


That safety jam was part of a broader initiative to challenge developers featuring new Data.gov Safety “data sets” that gained fresh exposure this month at the White House’s Safety Datapalooza.

I took a deeper look to see what innovation with government data is possible.

Keep reading →

Congressman Darrell Issa (R-Calif) is proposing legislation that would provide sweeping reforms in the way technology is managed and acquired at federal agencies in an effort to eliminate duplication and waste.

The provisions would grant significantly more power to federal chief information officers to control the technology that agencies acquire. Keep reading →

Government leaders offered testimony today at a Senate hearing on steps being taken to ensure effectiveness and efficiency in the federal workforce.

Several witnesses delivered remarks to the Subcommittee on the Oversight of Government Management, the Federal Workforce and the District of Columbia about the most serious challenges facing federal workers. Keep reading →

This is one in a series of profiles on the 2012 Samuel J. Heyman Service to America Medal finalists. The awards, presented by the nonprofit Partnership for Public Service, recognize outstanding federal employees whose important, behind-the-scenes work is advancing the health, safety and well-being of Americans and are among the most prestigious honors given to civil servants. This profile features a finalist for the Justice and law Enforcement medal Michael Hertz, who until his death in May was deputy assistant attorney general in the Civil Division of the Department of Justice.

To many in the legal community, Michael Hertz was known as “Mr. False Claims Act” for his leading role during the past quarter century in using this important federal law to combat fraud against the federal government. Keep reading →


This is one in a series of profileson the 2012 Samuel J. Heyman Service to America Medal finalists. The awards, presented by the nonprofit Partnership for Public Service, recognize outstanding federal employees whose important, behind-the-scenes work is advancing the health, safety and well-being of Americans and are among the most prestigious honors given to civil servants. This profile features Management Excellence medal finalists from the Office of Personnel Management in Washington, D.C., Joseph Kennedy, deputy associate director, Ray Decker, assistant director and Hakeem Basheerud-Deen, deputy assistant director.

Declaring that the government has an obligation to those who have served and sacrificed in defense of our nation, President Obama in 2009 issued an executive order calling for federal agencies to step up efforts to recruit and hire qualified veterans. Keep reading →


This is one in a series of profiles on the 2012 Samuel J. Heyman Service to America Medal finalists. The awards, presented by the nonprofit Partnership for Public Service, recognize outstanding federal employees whose important, behind-the-scenes work is advancing the health, safety and well-being of Americans and are among the most prestigious honors given to civil servants. This profile features a finalist for the Career Achievement medal Lynne Mofenson, chief of the Pediatric, Adolescent and Maternal Branch at the National Institutes of Health in Rockville, Md.

As the number of children with AIDS increased dramatically in the United States and around the world during the late 1980s, the depressing fact was that little could be done to prevent infants from getting HIV, the virus that causes the terrible disease. Keep reading →


Cybersecurity is on the top of many public and private sector IT agendas these days. But while organizations focus on the software and hardware to police networks, they often don’t consider the standards necessary to have all those defenses working together, or the possible cost savings that can be achieved through improved cybersecurity.

Standards and guidelines are often overlooked in the cybersecurity space in favor of cost savings, said Donna Dodson, deputy cybersecurity advisor at the National Institute of Standards and Technology. Keep reading →


After years of the public and private sectors having listened to the nearly constant cyber threat warnings issued by military and government officials, as well as industry experts, over the past few years, addressing the threats posed to our systems by cyber attacks is now appropriately considered as a work-in-process.

There are some signs that the private sector might be moving to address the new heightened level of cyber security threats, however. Keep reading →

Page 2 of 14123456...14